{"id":3992,"date":"2018-06-22T13:42:43","date_gmt":"2018-06-22T13:42:43","guid":{"rendered":"https:\/\/www.threatshub.org\/blog\/dont-panic-but-your-baby-monitor-can-be-hacked-into-a-spycam\/"},"modified":"2018-06-22T13:42:43","modified_gmt":"2018-06-22T13:42:43","slug":"dont-panic-but-your-baby-monitor-can-be-hacked-into-a-spycam","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/dont-panic-but-your-baby-monitor-can-be-hacked-into-a-spycam\/","title":{"rendered":"Don&#8217;t panic, but your baby monitor can be hacked into a spycam"},"content":{"rendered":"<p>Security researchers say they can back up a mother&#8217;s claim that her baby monitor had been remotely hacked and used to spy on her family.<\/p>\n<p><a target=\"_blank\" rel=\"nofollow\" href=\"https:\/\/www.sec-consult.com\/en\/blog\/2018\/06\/true-story-the-case-of-a-hacked-baby-monitor-gwelltimes-p2p-cloud\/\">SEC Consult says<\/a> it found flaws in the Fredi Wi-Fi baby monitor that would allow an outside attacker to remotely connect to the device and use its built in camera without authentication.<\/p>\n<p><em>The Register<\/em> has contacted the company that makes the Fredi for comment, but has yet to hear back.<\/p>\n<p>According to the researchers, the monitors use poor security practices when connecting to the online portal that allows parents to view the monitors on either their laptops or mobile devices. This leaves them prone to be hijacked by hackers who could then use the cameras to spy on people.<\/p>\n<p><a target=\"_blank\" rel=\"nofollow\" href=\"https:\/\/abcnews.go.com\/US\/south-carolina-parents-baby-monitor-hacked-camera-lens\/story?id=55633540\">Such was the case<\/a> with Jamie Schmidt, a mother from South Carolina who complained that her monitor&#8217;s camera was panning the room on its own and, after she discovered the activity, locked her out from the control panel.<\/p>\n<p>&#8220;&#8221;It makes me kind of sick to think what kind of stuff the person may have seen and still could be out there,&#8221; Schmidt said.<\/p>\n<p>&#8220;I&#8217;m supposed to protect my son and I feel like I failed him.&#8221;<\/p>\n<p>The security shop&#8217;s researchers decided to look into the matter, and they found that the P2P service connects directly to the cloud and can be accessed with no more than an 8-digit device number and a shared default password. In other words, someone could go to the online portal and enter random numbers with the default password to pull up camera feeds.<\/p>\n<p>&#8220;Unfortunately the device ID does not look very secure,&#8221; the researchers wrote.<\/p>\n<p>&#8220;Plus the default password is neither randomly generated nor device-specific. Unless the user has changed the password to a secure one, anyone can log in and interact with the camera by &#8216;trying&#8217; different cloud IDs.&#8221;<\/p>\n<div class=\"promo_article\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/regmedia.co.uk\/2015\/01\/29\/medical_doctor_healthcare_channel.jpg?x=174&amp;y=115&amp;crop=1\" width=\"174\" height=\"115\" alt=\"Crop of doctor with pen and clipboard\"\/><\/p>\n<h2 title=\"Living off grid, in the woods, away from all tech not such a loony idea after all\">Fridge killed my baby? Mag-field radiation from household stuff &#8216;boosts miscarriage risk&#8217;<\/h2>\n<p><a href=\"https:\/\/www.theregister.co.uk\/2017\/12\/19\/radiation_risk_miscarriage_study_says\/\"><span>READ MORE<\/span><\/a><\/div>\n<p>In addition to being creepy as hell, SEC Consult notes that the insecure monitors are also providing a wide open door to their owners&#8217; home networks to invite further attacks.<\/p>\n<p>&#8220;The &#8216;P2P Cloud&#8217; feature bypasses firewalls and effectively allows remote connections into private networks. Now attackers can not only attack devices that have been intentionally\/unintentionally exposed to the web (classic \u201cShodan hacking\u201d or the Mirai approach) but a large number of devices that are exposed via the &#8216;P2P Cloud&#8217;.&#8221;<\/p>\n<p>The researchers also note that this does not appear to be an isolated incident. The Chinese company that provided the firmware for the Fredi monitor makes generic camera control apps for a number of devices, and its insecure portal is likely used on other appliances.<\/p>\n<p>&#8220;It seems that consumer electronics with opaque supply chains, paired with insecure, built-in cloud features that are enabled by default will keep us busy in the future,&#8221; they write.<\/p>\n<p>Users are advised to use some basic practices like immediately changing default passwords and keeping an eye out for suspicious hardware activity and network traffic. \u00ae<\/p>\n<p class=\"wptl btm\"><span>Sponsored:<\/span> <a href=\"https:\/\/go.theregister.co.uk\/tl\/1759\/shttp:\/\/www.mcubed.london\/\">Minds Mastering Machines &#8211; Call for papers now open<\/a><\/p>\n<p>READ MORE <a href=\"http:\/\/go.theregister.com\/feed\/www.theregister.co.uk\/2018\/06\/22\/baby_monitor_hacked\/\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Researchers confirm hardware vulnerable to remote attacks Security researchers say they can back up a mother&#8217;s claim that her baby monitor had been remotely hacked and used to spy on her family.\u2026 READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":3993,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[63],"tags":[],"class_list":["post-3992","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-the-register"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Don&#039;t panic, but your baby monitor can be hacked into a spycam 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/dont-panic-but-your-baby-monitor-can-be-hacked-into-a-spycam\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Don&#039;t panic, but your baby monitor can be hacked into a spycam 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/dont-panic-but-your-baby-monitor-can-be-hacked-into-a-spycam\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2018-06-22T13:42:43+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/06\/dont-panic-but-your-baby-monitor-can-be-hacked-into-a-spycam.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"174\" \/>\n\t<meta property=\"og:image:height\" content=\"115\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/dont-panic-but-your-baby-monitor-can-be-hacked-into-a-spycam\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/dont-panic-but-your-baby-monitor-can-be-hacked-into-a-spycam\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Don&#8217;t panic, but your baby monitor can be hacked into a spycam\",\"datePublished\":\"2018-06-22T13:42:43+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/dont-panic-but-your-baby-monitor-can-be-hacked-into-a-spycam\\\/\"},\"wordCount\":535,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/dont-panic-but-your-baby-monitor-can-be-hacked-into-a-spycam\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/06\\\/dont-panic-but-your-baby-monitor-can-be-hacked-into-a-spycam.jpg\",\"articleSection\":[\"The Register\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/dont-panic-but-your-baby-monitor-can-be-hacked-into-a-spycam\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/dont-panic-but-your-baby-monitor-can-be-hacked-into-a-spycam\\\/\",\"name\":\"Don't panic, but your baby monitor can be hacked into a spycam 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/dont-panic-but-your-baby-monitor-can-be-hacked-into-a-spycam\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/dont-panic-but-your-baby-monitor-can-be-hacked-into-a-spycam\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/06\\\/dont-panic-but-your-baby-monitor-can-be-hacked-into-a-spycam.jpg\",\"datePublished\":\"2018-06-22T13:42:43+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/dont-panic-but-your-baby-monitor-can-be-hacked-into-a-spycam\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/dont-panic-but-your-baby-monitor-can-be-hacked-into-a-spycam\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/dont-panic-but-your-baby-monitor-can-be-hacked-into-a-spycam\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/06\\\/dont-panic-but-your-baby-monitor-can-be-hacked-into-a-spycam.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/06\\\/dont-panic-but-your-baby-monitor-can-be-hacked-into-a-spycam.jpg\",\"width\":174,\"height\":115},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/dont-panic-but-your-baby-monitor-can-be-hacked-into-a-spycam\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Don&#8217;t panic, but your baby monitor can be hacked into a spycam\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Don't panic, but your baby monitor can be hacked into a spycam 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/dont-panic-but-your-baby-monitor-can-be-hacked-into-a-spycam\/","og_locale":"en_US","og_type":"article","og_title":"Don't panic, but your baby monitor can be hacked into a spycam 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/dont-panic-but-your-baby-monitor-can-be-hacked-into-a-spycam\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2018-06-22T13:42:43+00:00","og_image":[{"width":174,"height":115,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/06\/dont-panic-but-your-baby-monitor-can-be-hacked-into-a-spycam.jpg","type":"image\/jpeg"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/dont-panic-but-your-baby-monitor-can-be-hacked-into-a-spycam\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/dont-panic-but-your-baby-monitor-can-be-hacked-into-a-spycam\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Don&#8217;t panic, but your baby monitor can be hacked into a spycam","datePublished":"2018-06-22T13:42:43+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/dont-panic-but-your-baby-monitor-can-be-hacked-into-a-spycam\/"},"wordCount":535,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/dont-panic-but-your-baby-monitor-can-be-hacked-into-a-spycam\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/06\/dont-panic-but-your-baby-monitor-can-be-hacked-into-a-spycam.jpg","articleSection":["The Register"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/dont-panic-but-your-baby-monitor-can-be-hacked-into-a-spycam\/","url":"https:\/\/www.threatshub.org\/blog\/dont-panic-but-your-baby-monitor-can-be-hacked-into-a-spycam\/","name":"Don't panic, but your baby monitor can be hacked into a spycam 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/dont-panic-but-your-baby-monitor-can-be-hacked-into-a-spycam\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/dont-panic-but-your-baby-monitor-can-be-hacked-into-a-spycam\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/06\/dont-panic-but-your-baby-monitor-can-be-hacked-into-a-spycam.jpg","datePublished":"2018-06-22T13:42:43+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/dont-panic-but-your-baby-monitor-can-be-hacked-into-a-spycam\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/dont-panic-but-your-baby-monitor-can-be-hacked-into-a-spycam\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/dont-panic-but-your-baby-monitor-can-be-hacked-into-a-spycam\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/06\/dont-panic-but-your-baby-monitor-can-be-hacked-into-a-spycam.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/06\/dont-panic-but-your-baby-monitor-can-be-hacked-into-a-spycam.jpg","width":174,"height":115},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/dont-panic-but-your-baby-monitor-can-be-hacked-into-a-spycam\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Don&#8217;t panic, but your baby monitor can be hacked into a spycam"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/3992","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=3992"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/3992\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/3993"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=3992"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=3992"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=3992"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}